Wednesday, December 3, 2014

Most famous Pyramid scheme

pyramid scheme is an unsustainable business model that involves promising participants payment or services, primarily for enrolling other people into the scheme, rather than supplying any real investment or sale of products or services to the public.[1][2]

These types of schemes have existed for at least a century, some with variations to hide their true nature. Multilevel marketing plans have also been classified as pyramid schemes.[27][28][29][30]

Concept and basic models[edit]

In a pyramid scheme, an organization compels individuals to make a payment and join. In exchange, the organization promises its new members a share of the money taken from every additional member that they recruit. The directors of the organization (those at the top of the pyramid) also receive a share of these payments. For the directors, the scheme is potentially lucrative—whether or not they do any work, the organization's membership has a strong incentive to continue recruiting and funneling money to the top of the pyramid.
Such organizations seldom involve sales of products or services with real value. Without creating any goods or services, the only ways for a pyramid scheme to generate revenue are to recruit more members or solicit more money from current members. Eventually, recruiting is no longer possible and the plurality of members are unable to profit from the scheme.

The "Eight-Ball" model[edit]

Many pyramids are more sophisticated than the simple model. These recognize that recruiting a large number of others into a scheme can be difficult so a seemingly simpler model is used. In this model each person must recruit two others, but the ease of achieving this is offset because the depth required to recoup any money also increases. The scheme requires a person to recruit two others, who must each recruit two others, who must each recruit two others.
The "eight-ball" model contains a total of fifteen members. Note that unlike in the picture, the triangular setup in the cue game of eight-ballcorresponds to an arithmetic progression 1 + 2 + 3 + 4 + 5 = 15. The pyramid scheme in the picture in contrast is a geometric progression 1 + 2 + 4 + 8 = 15.
Prior instances of this scheme have been called the "Airplane Game" and the four tiers labelled as "captain", "co-pilot", "crew", and "passenger" to denote a person's level. Another instance was called the "Original Dinner Party" which labeled the tiers as "dessert", "main course", "side salad", and "appetizer". A person on the "dessert" course is the one at the top of the tree. Another variant, "Treasure Traders", variously used gemology terms such as "polishers", "stone cutters", etc. or gems like "rubies", "sapphires", "diamonds", etc.
Such schemes may try to downplay their pyramid nature by referring to themselves as "gifting circles" with money being "gifted". Popular schemes such as "Women Empowering Women"[31] do exactly this.
Whichever euphemism is used, there are 15 total people in four tiers (1 + 2 + 4 + 8) in the scheme—with the Airplane Game as the example, the person at the top of this tree is the "captain", the two below are "co-pilots", the four below are "crew," and the bottom eight joiners are the "passengers".
The eight passengers must each pay (or "gift") a sum (e.g., $5,000) to join the scheme. This sum (e.g., $40,000) goes to the captain who leaves, with everyone remaining moving up one tier. There are now two new captains so the group splits in two with each group requiring eight new passengers. A person who joins the scheme as a passenger will not see a return until they advance through the crew and co-pilot tiers and exit the scheme as a captain. Therefore, the participants in the bottom three tiers of the pyramid lose their money if the scheme collapses.
If a person is using this model as a scam, the confidence trickster would take the majority of the money. They would do this by filling in the first three tiers (with one, two, and four people) with phony names, ensuring they get the first seven payouts, at eight times the buy-in sum, without paying a single penny themselves. So if the buy-in were $5,000, they would receive $40,000, paid for by the first eight investors. They would continue to buy in underneath the real investors, and promote and prolong the scheme for as long as possible to allow them to skim even more from it before it collapses.
Although the "captain" is the person at the top of the tree, having received the payment from the eight paying passengers, once they leave the scheme they are able to re-enter the pyramid as a "passenger" and hopefully recruit enough to reach captain again, thereby earning a second payout.

Matrix schemes[edit]

Main article: Matrix scheme
Matrix schemes use the same fraudulent non-sustainable system as a pyramid; here, the participants pay to join a waiting list for a desirable product which only a fraction of them can ever receive. Since matrix schemes follow the same laws of geometric progression as pyramids, they are subsequently as doomed to collapse. Such schemes operate as a queue, where the person at head of the queue receives an item such as a television, games console, digital camcorder, etc. when a certain number of new people join the end of the queue. For example, ten joiners may be required for the person at the front to receive their item and leave the queue. Each joiner is required to buy an expensive but potentially worthless item, such as an e-book, for their position in the queue. The scheme organizer profits because the income from joiners far exceeds the cost of sending out the item to the person at the front. Organizers can further profit by starting a scheme with a queue with shill names that must be cleared out before genuine people get to the front. The scheme collapses when no more people are willing to join the queue. Schemes may not reveal, or may attempt to exaggerate, a prospective joiner's queue position which essentially means the scheme is a lottery. Some countries have ruled that matrix schemes are illegal on that basis.

Connection to multi-level marketing[edit]

Main article: Multi-level marketing
The network marketing or multi-level marketing (MLM) business has become associated with pyramid schemes. According to the U.S. Federal Trade Commission, many MLM schemes "simply use the product to hide their pyramid structure".[32] While some people call MLMs in general "pyramid selling,"[33][34][35][36][37] others use the term to denote an illegal pyramid scheme masquerading as an MLM.[38]
The Federal Trade Commission warns, "It’s best not to get involved in plans where the money you make is based primarily on the number of distributors you recruit and your sales to them, rather than on your sales to people outside the plan who intend to use the products."[39] It states that research is your best tool and gives eight steps to follow:
  1. Find—and study—the company’s track record.
  2. Learn about the product.
  3. Ask questions.
  4. Understand any restrictions.
  5. Talk to other distributors. Beware of shills.
  6. Consider using a friend or adviser as a neutral sounding board, or for a gut check.
  7. Take your time.
  8. Think about whether this plan suits your talents and goals.[39]
Some authorities contend that MLMs in general are nothing more than legalized pyramid schemes.[27][28][29][30]

Connection to franchise fraud[edit]

Main article: Franchise fraud
Franchise fraud (or "franchise churning") is defined by the U.S. Federal Bureau of Investigation as a pyramid scheme. The FBI website states:
Pyramid schemes—also referred to as franchise fraud or chain referral schemes—are marketing and investment frauds in which an individual is offered a distributorship or franchise to market a particular product. The real profit is earned, not by the sale of the product, but by the sale of new distributorships. Emphasis on selling franchises rather than the product eventually leads to a point where the supply of potential investors is exhausted and the pyramid collapses.[40]
One of Pearlasia Gamboa’s (president of the micronation of Melchizedek) franchise fraud schemes was described by the Italian newspaper La Repubblica as “one of the most diabolical international scams ever devised in recent years.”[41]

Notable recent cases[edit]

Internet[edit]

In 2003, the United States Federal Trade Commission (FTC) disclosed what it called an Internet-based "pyramid scam." Its complaint states that customers would pay a registration fee to join a program that called itself an "internet mall" and purchase a package of goods and services such as internet mail, and that the company offered "significant commissions" to consumers who purchased and resold the package. The FTC alleged that the company's program was instead and in reality a pyramid scheme that did not disclose that most consumers' money would be kept, and that it gave affiliates material that allowed them to scam others.[42]
WinCapita was a scheme run by Finnish criminals that involved about €100 million.

Others[edit]

The 1997 rebellion in Albania was partially motivated by the collapse of Ponzi schemes; however, they were widely referred to as pyramid schemes due to their prevalence in Albanian society.
In early 2006, Ireland was hit by a wave of schemes with major activity in Cork and Galway. Participants were asked to contribute €20,000 each to a "Liberty" scheme which followed the classic eight-ball model. Payments were made in MunichGermany to skirt Irish tax laws concerning gifts. Spin-off schemes called "Speedball" and "People in Profit" prompted a number of violent incidents and calls were made by politicians to tighten existing legislation.[43] Ireland has launched a website to better educate consumers to pyramid schemes and other scams.[44]
On 12 November 2008, riots broke out in the municipalities of PastoTumacoPopayan and Santander de QuilichaoColombia after the collapse of several pyramid schemes. Thousands of victims had invested their money in pyramids that promised them extraordinary interest rates. The lack of regulation laws allowed those pyramids to grow excessively during several years. Finally, after the riots, the Colombian government was forced to declare the country in a state of economic emergency to seize and stop those schemes. Several of the pyramid's managers were arrested, and are being prosecuted for the crime of "illegal massive money reception."[45]
The Kyiv Post reported on 26 November 2008 that American citizen Robert Fletcher (Robert T. Fletcher III; aka "Rob") was arrested by the SBU (Ukraine State Police) after being accused by Ukrainian investors of running a Ponzi scheme and associated pyramid scam netting US$20 million. (The Kiev Post also reports that some estimates are as high as US$150M.)
Throughout 2010 and 2011 a number of authorities around the world including the Australian Competition and Consumer Commission, the Bank of Namibia and the Central Bank of Lesotho have declared TVI Express to be a pyramid scheme. TVI Express, operated by Tarun Trikha from India has apparently recruited hundreds of thousands of "investors", very few of whom, it is reported, have recouped any of their investment.[46][47][48][49][50] In 2013, Tarun Trikha was arrested at the IGI Airport in New Delhi.[51]

In popular culture[edit]

  • In The King of Queens episode entitled "Soft Touch", Doug gets sucked into a pyramid scheme when his persuasive neighbor recruits him to sell water filters.
  • Stanton, a character of Charles Maturin's famous novel Melmoth the Wanderer, while put in Bedlam by his relative, finds a plan, written by some of his predecessors in the room he is placed. It is a plan of baptising all the population of Ottoman Empire, beginning with the Turkish ambassador, and is a classical pyramid scheme.
  • The feature film Children of Invention tells the story of a mother who gets entangled in a pyramid scheme.
  • The novel Welcome to the N.H.K. features a story arc wherein the main character is caught up in a crooked multi-level marketing scam called Mouse Road.
  • On the NBC sitcom The Office, it is revealed that Michael did not attend college because he lost all his tuition money in a pyramid scheme. At a later date, the same character unintentionally attempts to recruit members of his staff into selling calling cards, not realizing that he had been conned into a pyramid scheme until it is made clear by an employee.
  • Season one of the Channel 4 sitcom Peep Show, features an episode in which Jeremy becomes involved in a pyramid scheme after being ignorantly drawn into it by his neighbor Toni, whom he is trying to seduce.
  • The 2010 film The Fighter features Dicky Eklund attempting a pyramid scheme to help pay for his brother's training.
  • In two episodes of the sitcom Two and a Half Men entitled "Three Hookers and a Philly Cheesesteak" and "That Darn Priest", Alan runs a Ponzi scheme, targeting family and friends, in the name of his chiropractor business until Rose finds out and threatens to tell all his investors if he does not stop.
  • In 2014, 62 artists in Brooklyn, New York created a pyramid scheme as new way of curating a contemporary art exhibit. "The Pyramid Scheme will not only reveal patterns and themes within contemporary art, but the social support structures which enable its creation."[52]
  • In the King of the Hill episode entitled "Bill of Sales" Peggy gets caught up in a pyramid scheme.
  • In the episode of The Simpsons titled "I Married Marge", Homer attends an investment seminar where the host introduces the 'Trapezoid Scheme' as an alternative to a Pyramid Scheme, before jumping out of a nearby window after hearing police sirens.
  • In the episode of Kath & Kim titled "Money", Kath organizes a pyramid scheme lingerie party with Kim and Sharon modeling the merchandise so that Kath can raise enough money to pay for a pumpkin style coach for her upcoming wedding.
  • In the It's Always Sunny in Philadelphia episode entitled "Mac and Dennis Buy a Timeshare", Sweet Dee begins selling for 'Invigaron', a multi-level marketing scam involving South American berries that bills itself as a 'Reverse Funnel System', using an upside-down triangle to demonstrate how it works. Frank points out to her that it's a pyramid scheme after telling her to turn the Reverse Funnel upside down.

See also[edit]


http://en.wikipedia.org/wiki/Pyramid_scheme
http://www.ftc.gov/public-statements/1998/05/pyramid-schemes

Opt out of global data surveillance programs like PRISM, XKeyscore andTempora.

Want to avoid being a "target" of this "switch-latching"? A site called "Prism-break" recently released a smorgasbord of encrypted browsing, chat, and email services that supposedly allow the user to evade government scrutiny.


Opt out of global data surveillance programs like PRISMXKeyscore andTempora.

Tempora is the codeword for a formerly secret computer system that is used by the British Government Communications Headquarters (GCHQ). This system is used to buffer internet communications that are extracted from fibre-optic cables, so these can be processed and searched.[2] It was tested since 2008 and became operational in the autumn of 2011.[3]
Tempora uses intercepts on the fibre-optic cables that make up the backbone of the internet to gain access to large amounts of internet users' personal data. The intercepts are placed in the United Kingdom and overseas, with the knowledge of companies owning either the cables or landing stations.[4]
The existence of Tempora was revealed by Edward Snowden, a former American intelligence contractor who leaked information about the program to former Guardian journalist Glenn Greenwald in May 2013, as part of his revelations of government-sponsored mass surveillance programs. Documents Snowden acquired claimed that data collected by the Tempora program is shared with the National Security Agency of the United States.[5]

Operation[edit]

According to Edward Snowden, Tempora has two principal components called "Mastering the Internet" (MTI) and "Global Telecoms Exploitation" (GTE). He claimed that each is intended to collate online and telephone traffic.[5] This however contradicts two original documents, which say that Tempora is only for internet traffic, just like the XKeyscore system of the NSA, components of which are incorporated in Tempora.[2] [6]
It is alleged that GCHQ produces larger amounts of metadata than NSA. By May 2012 300 GCHQ analysts and 250 NSA analysts had been assigned to sort data.[5]
The Guardian claims that no distinction is made in the gathering of data between private citizens and targeted suspects.[5] Tempora is said to include recordings of telephone calls, the content of email messages, Facebook entries and the personal internet history of users. Snowden said of Tempora that "It's not just a U.S. problem. The UK has a huge dog in this fight...They [GCHQ] are worse than the U.S."[5]
Claims exist that Tempora was possible only by way of secret agreements with commercial companies, described in Snowden's leaked documents as "intercept partners". Some companies are alleged to have been paid for their co-operation. Snowden also alleged that GCHQ staff were urged to disguise the origin of material in their reports for fear that the role of the companies as intercept partners would cause "high-level political fallout".[5] The companies are forbidden to reveal the existence of warrants compelling them to allow GCHQ access to the cables. If the companies fail to comply they can be compelled to do so.[5]
Lawyers for GCHQ said it would be impossible to list the total number of people targeted by Tempora because "this would be an infinite list which we couldn't manage".[5]
GCHQ set up a three-year trial at the GCHQ Bude in Cornwall. GCHQ had probes attached to more than 200 internet links by Summer 2011, each probe carried 10 gigabits of data a second.[5] NSA analysts were brought into the trials, and Tempora was launched in Autumn 2011, with data shared with the NSA. Ongoing technical work is expanding GCHQ's capacity to collect data from new super cables that carry data at 100 gigabits a second.[5] The data is preserved for three days while metadata is kept for thirty days.[1]
TEMPORA comprises different components, like the actual access points to fiber-optic cables, a sanitisation program codenamed POKERFACE, the XKEYSCORE system developed by NSA, and a Massive Volume Reduction (MVR) capability.[2]
In May 2012, GCHQ had TEMPORA systems installed at the following locations:[2]
  • 16 for 10 gigabit/second cables at the CPC processing center
  • 7 for 10 gigabit/second cables at the OPC processing center
  • 23 for 10 gigabit/second cables at the RPC1 processing center

Reactions[edit]

UK Defence officials issued a confidential DA-Notice to the BBC and other media asking the media to refrain from running further stories related to surveillance leaks including US PRISM program and the British involvement therein.[7][8]
The US Army has restricted its employees' access to the Guardian website since the beginning of the NSA leaks of PRISM and Tempora "in order to prevent an unauthorized disclosure of classified information."[9]
German Federal Minister of Justice Sabine Leutheusser-Schnarrenberger tweeted that she considered the program an "Alptraum" ("nightmare") and demanded that European institutions investigate the matter.[10][11]
Jan Philipp Albrecht, German Member of the European Parliament and spokesperson for Justice and Home Affairs of the Greens/EFA parliamentary group, called for an infringement procedure against the United Kingdom for having violated its obligations relating to the protection of individuals with regard to the processing of personal data under Article 16 of the Treaties of the European Union.[12]

See also[edit]

Help make mass surveillance of entire populations uneconomical! We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services.

https://prism-break.org/en/

The Creepy, Long-Standing Practice of Undersea Cable Tapping

The newest NSA leaks reveal that governments are probing "the Internet's backbone." How does that work?




In the early 1970's, the U.S. government learned that an undersea cable ran parallel to the Kuril Islands off the eastern coast of Russia, providing a vital communications link between two major Soviet naval bases. The problem? The Soviet Navy had completely blocked foreign ships from entering the region.

Not to be deterred, the National Security Agency launched Operation Ivy Bells, deploying fast-attack submarines and combat divers to drop waterproof recording pods on the lines. Every few weeks, the divers would return to gather the tapes and deliver them to the NSA, which would then binge-listen to their juicy disclosures.

The project ended in 1981, when NSA employee Ronald Pelton sold informationabout the program to the KGB for $35,000. He's still serving his life prison term.
The operation might have ended, but for the NSA, this underwater strategy clearly stuck around.

In addition to gaining access to web companies' servers and asking for phone metadata, we've now learned that both the U.S. and the U.K. spy agencies aretapping directly into the Internet's backbone -- the undersea fiber optic cables that shuttle online communications between countries and servers. For some privacy activists, this process is even more worrisome than monitoring call metadata because it allows governments to make copies of everything that transverses these cables, if they wanted to.
The British surveillance programs have fittingly sinister titles: "Mastering the Internet" and "Global Telecoms Exploitation," according to The Guardian.

A subsidiary program for these operations -- Tempora -- sucks up around 21 million gigabytes per day and stores the data for a month. The data is shared with NSA, and there are reportedly 550 NSA and GCHQ analysts poring over the information they've gathered from at least 200 fiber optic cables so far.

The scale of the resulting data harvest is tremendous. From The Guardian:
This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites -- all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets.

In an interview with online security analyst Jacob Appelbaum, NSA leaker Edward Snowden called the British spy agency GCHQ "worse than" the NSA, saying it represents the first "full take" system, in which surveillance networks catch all Internet traffic regardless of its content. Appelbaum asked Snowden if "anyone could escape" Tempora:
"Well, if you had the choice, you should never send information over British lines or British servers," Snowden said. "Even the Queen's selfies with her lifeguards would be recorded, if they existed."

The U.S.'s own cable-tapping program, known by the names OAKSTAR, STORMBREW, BLARNEY and FAIRVIEW, as revealed in an NSA PowerPoint slide, apparently functions similarly to Tempora, accessing "communications on fiber cables and infrastructure as data flows past," according to The Washington Post. The slide indicates that Prism and these so-called "upstream" programs work together somehow, with an arrow saying "You Should Use Both" pointing to the two operations.

So how does one tap into an underwater cable?
The process is extremely secretive, but it seems similar to tapping an old-fashioned, pre-digital telephone line -- the eavesdropper gathers up all the data that flows past, then deciphers it later.
Screen Shot 2013-07-16 at 11.17.56 AM.png
More than 550,000 miles of flexible undersea cables about the size of garden watering hoses carry all the world's emails, searches, and tweets. Together, they shoot the equivalent of several hundred Libraries of Congress worth of information back and forth every day.

In 2005, the Associated Press reported that a submarine called the USS Jimmy Carter had been repurposed to carry crews of technicians to the bottom of the sea so they could tap fiber optic lines. The easiest place to get into the cables is at the regeneration points -- spots where their signals are amplified and pushed forward on their long, circuitous journeys. "At these spots, the fiber optics can be more easily tapped, because they are no longer bundled together, rather laid out individually," Deutsche Welle reported.

But such aquatic endeavors may no longer even be necessary. The cables make landfall at coastal stations in various countries, where their data is sent on to domestic networks, and it's easier to tap them on land than underwater. Britain is, geographically, in an ideal position to access to cables as they emerge from the Atlantic, so the cooperation between the NSA and GCHQ has been key. Beyond that partnership, there are the other members of the "Five Eyes" -- the Australians, the New Zealanders, and the Canadians -- that also collaborate with the U.S., Snowden said.


The tapping process apparently involves using so-called "intercept probes." According to two analysts I spoke to, the intelligence agencies likely gain access to the landing stations, usually with the permission of the host countries oroperating companies, and use these small devices to capture the light being sent across the cable. The probe bounces the light through a prism, makes a copy of it, and turns it into binary data without disrupting the flow of the original Internet traffic.

"We believe our 3D MEMS technology -- as used by governments and various agencies -- is involved in the collection of intelligence from ... undersea fibers," said a director of business development at Glimmerglass, a government contractor that appeared, at least according to a 2010 Aviation Week article, to conduct similar types of interceptions, though it's unclear whether they took part in the British Tempora or the U.S. upstream programs. In a PowerPoint presentation, Glimmerglass once boasted that it provided "optical cyber solutions" to the intelligence community, offering the ability to monitor everything from Gmail to Facebook. "We are deployed in several countries that are using it for lawful interception. They've passed laws, publicly known, that they will monitor all international traffic for interdiction of any kind of terrorist activity."
Screen Shot 2013-07-10 at 6.54.48 PM.png
Slide from a Glimmerglass presentation
The British publication PC Pro presented another theory: that slightly bending the cables could allow a receiver to capture their contents.

One method is to bend the cable and extract enough light to sniff out the data. "You can get these little cylindrical devices off eBay for about $1,000. You run the cable around the cylinder, causing a slight bend in cable. It will emit a certain amount of light, one or two decibels. That goes into the receiver and all that data is stolen in one or two decibels of light. Without interrupting transfer flow, you can read everything going on on an optical network," said Everett.

The loss is so small, said Everett, that anyone who notices it might attribute it to a loose connection somewhere along the line. "They wouldn't even register someone's tapping into their network," he added.

Once it's gathered, the data gets sifted. Most of it is discarded, but the filters pull out material that touches on one of the 40,000 search terms chosen by the NSA and GCHQ -- that's the content the two agencies inspect more closely.

The British anti-surveillance group Privacy International has filed a lawsuit against the U.K. government, arguing that such practices amount to "blanket surveillance" and saying that British courts do "not provide sufficiently specific or clear authorization for such wide-ranging and universal interception of communications." Their argument is that the existing surveillance laws are from the phone-tapping days and can't be applied to modern, large-scale electronic data collection.

"If their motivation is to catch terrorists, then are there less intrusive methods than spying on everyone whose traffic happens to transverse the U.K.?" said Eric King, head of research at Privacy International.

Meanwhile, the British agency, the GCHQ, has defended their practices by saying that they are merely looking for a few suspicious "needles" in a giant haystack of data, and that the techniques have allowed them to uncover terrorist plots.
If groups like Privacy International are successful, it may put an end to the capture of domestic Internet data within the U.K., but as NSA expert Matthew Aid recently told me, since 80 percent of the fiber optic data flows through the U.S., it wouldn't stop the massive surveillance operations here or in other countries -- even if the person on the sending end was British.

It's also worth noting that this type of tapping has been going on for years -- it's just that we're now newly getting worked up about it. In 2007, the New York Times thus described President Bush's expansion of electronic surveillance: "the new law allows the government to eavesdrop on those conversations without warrants -- latching on to those giant switches -- as long as the target of the government's surveillance is 'reasonably believed' to be overseas."

Want to avoid being a "target" of this "switch-latching"? A site called "Prism-break" recently released a smorgasbord of encrypted browsing, chat, and email services that supposedly allow the user to evade government scrutiny.
The only platform for which there is no encrypted alternative is Apple's iOS, a proprietary software, for which the site had this warning:
"You should not entrust neither your communications nor your data to a closed source device."

http://www.theatlantic.com/international/archive/2013/07/the-creepy-long-standing-practice-of-undersea-cable-tapping/277855/